Computer Science ›› 2009, Vol. 36 ›› Issue (5): 21-26.
Previous Articles Next Articles
Online:
Published:
Abstract: Network Authentication Protocol Kerberos 5 provides us with a third-party authentication mechanism. The protocol was designed to allow a client to repeatedly authenticate herself to multiple network servers based on a single login. Nowadays this protocol
Key words: Kerberos 5,Formally analysis, Authentication,Confidentiality
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2009/V36/I5/21
Cited